UMUC Data Center

Verified

Added on  2019/10/01

|6
|1882
|248
Report
AI Summary
The provided content describes the assignment related to designing a network infrastructure for University of Maryland University College (UMUC) buildings. The main goals are to provide proper data protection and backup methods, implement a network monitoring solution, design a log storage and management system, and establish a troubleshooting methodology for IT personnel. The proposed solutions include cloud-based tenant storage, RAID data replication, NGIPS intrusion detection, Wireshark traffic analysis, log file management, and dedicated network administration rooms. These measures aim to ensure the security, availability, and performance of the UMUC network infrastructure, while also providing auditing and monitoring capabilities.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
I. Network Customization and Optimization
A. Network Services Needed
Technical Requirements
The buildings of the UMUC with LANs and WANs require the different categories of network
services. These identified network services are needed for students, office staffs and students.
Identified Proposed Network Services
The network services for LANs of the specified two buildings are identified with specified
requirements are as follows.
o Internet and WWW network service
o File transfer and directory network services
o WLAN and connectivity network services
o Authentication and authorization of resource network services
o Database and file processing network services
o Inter Premise mobility and LAN access services
o Network security and protection services
o Electronic mail and messaging services
Justification
The LAN and interfaced WAN of two buildings of UMUC require network services to the users.
Internet accessibility, file transfer, database processing etc are core network services must be
facility in shared mode to users. Electronic messaging and web services with secured messaging
system facilitate the users to send and receive the electronic mail and messages as per the
information requirements. Security and data protection are vital requirements to protect the
confidentiality and integrity of shared information among the users of LANs [1]. Therefore,
mentioned network services are core requirements for the LANs of two buildings of UMUC.
B. Additional Network Devices Needed to Implement the Network
Technical Requirements
Additional network servers are required to provide the stated network services to users of the
LANs of two buildings of UMUC.
Proposed Additional Network Servers
The proposed additional network servers required to be interfaced with LANs of the buildings
are as follows.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
o Database Server to provide shared data resources among the users
o Email and SMTP server to provide email services to the users
o Directory protocol servers to provide protected file access service
o Web Server to provide the global access of the information system resources.
Justification
The different categories of mentioned servers are required to provide different categories of
server based services to the users of the two buildings of UMUC. These servers provide
additional network based services for internal and external users of the information system of
UMUC.
C. Network Security Measures to be Implemented
Technical Requirements
Network security is one of the core requirement to secure the network of two buildings of
UMUC. The security measures ensure the protection of network resources from unauthorized use
and breaches of information system.
Propose Network Security Measures
The required network security measures for the LANs and WAN of the UMUC buildings are as
follows.
o Authentication security measures such as password, biometric access etc
o Authorization security measures such as Access control Matrix etc.
o Audit Trail security measure to identify the access history
o Anti-virus security measures.
Justification
Authentication provides the authentic access of the network resources, authorization provides the
authorized use of network resources, audit trail provides the accessed profile of different users of
the network and antivirus protects the network data and different applications of the network
resources and server systems [2].
D. Need of Network Services, Security Measures and Network Devices (Servers)
Network services, security measures and network servers are required to provide secured access
of the shared network resources of network UMUC’s buildings. Mentioned network services are
main requirement for all of the users of the network. LAN and WAN security measures are very
important due to It is fact that the data communicates through the public network and poses so
many security risks. Information hacking, data integrity breaches and unauthorized disclosure of
Document Page
confidential data of the network are provided by implementing the network security measures
onto the LAN and WAN entities such as servers and network devices [2][3]. These security
measures protects the network and user data from unauthorized disclosure and hacking. Anti
virus and Anti Malware programs secures the data and applications of the network from
corruption. The network devices like router, switch, cables and connectors are core requirement
for the network to be setup with star topology.
E. Network Storage and Cloud Based Services
Technical Requirements
Network storage is required to store the shared data and information along with applications of
the network. Cloud based storage system provides more secured network storage with huge
capacity [4]. Therefore, these two storages are beneficial for the network system of UMUC.
Proposed Network and Cloud based Storages
The replicated RAID (Redundant Array of Inexpensive Disk) is used for local network storage
and SAN network storage are required for storage repository of data and applications. SAN is a
type of data center for the users of UMUC. SAN network storage is a tenant based storage where
so many users can get services by paying the usage charge. This is classified as Storage as a
Service but actually this service is provided by cloud service provider. The cost of the SAN
storage use depends upon the use.
Justification
RAID provides the replicated data storage for network data storage having the capability of
backup and recovery of the networked data. SAN storage system provides the cloud based
storage which is a tenant system. This SAN storage gives huge capacity to store data in data
center serviced by third party.
F. Proper Data Protection and Backup Method
Technical Requirements
Data and information protection must be proper with respect to mechanisms and technologies.
The data protection is needed for disaster recovery process with the network and information
system of UMUC buildings.
Proposed Data Protection and Backup Method
Data protection and backup method are associated with the network administration UMUC
buildings.. Backing the data with regular interval to servers data must be scheduled on external
mediums such as DVD, CD, and additional Hard disks to protect data from the accidental
damage and hardware malfunctioning.
Document Page
Justification
Backup of the data of network resources and network storage provide the protection. Backup
mediums replicates the data and when the disasters occurs the backup mediums are taken to
recover the lost data into the network storage [4]. This method ensures the protection of lost data
to be recovered from the backup mediums.
G. Network Monitoring Solution
Technical Requirements
Network is required to be monitored to ensure the intrusion to the network is going on or not. If
intrusion is going on with the network then intrusion prevention system is activated to protect the
network from different categories of attack.
Proposed Network Monitoring System
NGIPS is implemented to detect and prevent intrusion of network to protect the network from
attack through alerting the network administrator that something else is going with the network.
Wireshark traffic filtering and analysis is required to be installed to filter and record the ongoing
event in network. The recorded instance is then analyzed to detect the else behavior with the
network.
Justification
The network intrusion detection and prevention system detects and prevents the network
intruders from the UMUC buildings. This NGIPS protects the network from various categories
of attacks by the network intruders. Wireshark legacy package filters and records the dumps of
the network traffic to further be analyzed to find out the network anomalies [5].
H. Log storage, Management and Storage
Technical Requirements
Logs are required to be stored to analyze the accessibility of the network resources with given
users. The log file management such as storage, keeping for a defined time and backing up to
take a copy for long time storage for auditing are required.
Proposed Log Storage and Management System
The logs are to be stored under server memory. log file is created with user account and stores
the user name, user system IP address, logging time, logout time, and server system instance
which is accessed by the users. The log is managed by audit trail with regular interval with the
servers of LANs. The cloud based virtual interface is implemented to store and record the log
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
files. This is done through the help of third party service provider such as ISP etc to records the
logs of each user who access the external world network such as Internet.
Justification
Log records supports the auditing of the accessibility of the information system of buildings of
UMUC. This audit trail supports the security of the user accounts and user personal information
and data from unauthorized access. This enables the management of the UMUC to identify the
security breaches and users who access the information which is not authorized for him or her
[5].
I. Troubleshooting Methodology Information Technology Personnel
Technical Requirements
The troubleshooting of network and its functional services are required to ensure the correct and
proper functioning of the servers, network and network devices of the UMUC building network.
Proposed Network Troubleshooting Methodology
Network administrating users troubleshoots the network. The troubleshooting is started when
error is reported by the users of the network. Network administrative staffs use the tools and
technologies to troubleshoot the network services of the devices and servers of the LANs of
UMUC buildings. A dedicated network administration room is specified for all the users of the
network administration department. Network troubleshooting tools are used and executed to
detect the problems with university building network are as follows.
o Netstat – Status of the network devices and components are troubles hooted by this tool.
o Ipconfig – specific IP is configured for the network device and system by this command
line tool.
o Speedtest.net – this is used to test the data traffic rate or network speed of the network.
o Ping – Check the network connection between internal and external network such as
Internet
o Tracet – trace the route that is connected with specified device or not
Justification
Network troubleshooting ensures the network, network devices functional aspects. The network
device malfunctioning, erroneous condition of servers and required services are detected and
corrected through the network troubleshooting. The dedicated administrative staffs of the
network perform the network troubleshooting to find out the given network problem to correct in
time to provide uninterrupted network services to the users.
Document Page
Refrences
[1] "Description of Typical Network Services on Servers", Utilize Windows, 2017. [Online].
Available: http://www.utilizewindows.com/description-of-typical-network-services-on-servers/.
[2] "The Basics of Information Security", Network Security, vol. 2014, no. 9, p. 4, 2014.
[3] G. Marin, "Network Security Basics", IEEE Security and Privacy Magazine, vol. 3, no. 6, pp.
68-72, 2005.
[4] M. Zaman, "Enterprise Data Backup & Recovery: A Generic Approach", IOSR Journal of
Engineering, vol. 03, no. 05, pp. 40-42, 2013.
[5] Sans.org, 2017. [Online]. Available:
https://www.sans.org/reading-room/whitepapers/detection/logging-monitoring-detect-network-
intrusions-compliance-violations-environment-33985.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]